Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_f00e0096b53d3001cf16d8be910d3eda_hijackloader_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-08_f00e0096b53d3001cf16d8be910d3eda_hijackloader_magniber.exe
Resource
win10v2004-20240802-en
Target
2024-09-08_f00e0096b53d3001cf16d8be910d3eda_hijackloader_magniber
Size
1.6MB
MD5
f00e0096b53d3001cf16d8be910d3eda
SHA1
18da8e0cd7f58023a7c60f7c7aba84cb469d934e
SHA256
4e776f63d47e6c00c05d88d2a8780afb32a6ab71c0ec61a37cb4555dbf6ea4c0
SHA512
60f3e23c7e2d9d3a3184d3e9fe08c31c42e14dbe6f69cbb0747ab61fb9033ee8bb588e8d72236ba42c92e3c663fb173cd1bec6dc527db01c0b1baa0dbfb23a5d
SSDEEP
49152:fhWSGltAJskBJiKlhmQ3OWJ0Wylj2t7ZAPZ8dzR:fhWStdLJ0WyljsAPc
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\code\bytedance\installer\LVInstallerCC\VideofusionInstaller\build\CC_RELEASE\FeedbackTool.pdb
PowerDeterminePlatformRole
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
CM_Get_Device_IDW
UnmapViewOfFile
FileTimeToSystemTime
ProcessIdToSessionId
GetCommandLineW
GetEnvironmentVariableW
GetDiskFreeSpaceExW
GetVolumeInformationW
QueryDosDeviceW
GetTempPathW
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetVersion
GetSystemDirectoryW
LocalAlloc
lstrcmpW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CopyFileW
MoveFileExW
WTSGetActiveConsoleSessionId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
CreateEventW
CreateThread
MoveFileW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
LoadLibraryExW
lstrcmpiW
lstrlenW
GetProcessId
GetModuleHandleA
GetTempFileNameW
GetLogicalDriveStringsW
GetVolumePathNameW
ReplaceFileW
SetCurrentDirectoryW
GetFileAttributesExW
GetNativeSystemInfo
CreateMutexW
FormatMessageA
OutputDebugStringA
ReleaseMutex
RegisterWaitForSingleObject
UnregisterWaitEx
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetEndOfFile
SetFilePointerEx
UnlockFile
LockFile
FlushFileBuffers
DeleteCriticalSection
MapViewOfFile
Sleep
SetThreadPriority
GetThreadPriority
IsDebuggerPresent
GetUserDefaultLangID
TryEnterCriticalSection
GetModuleHandleExW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
WaitForMultipleObjects
GlobalMemoryStatusEx
RtlCaptureStackBackTrace
QueueUserWorkItem
GetModuleHandleExA
GetProcessHeaps
HeapSetInformation
HeapUnlock
HeapLock
HeapWalk
GetProcessIoCounters
VirtualQueryEx
GetProcessTimes
GetSystemInfo
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
WriteConsoleW
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
FatalAppExitA
ReadConsoleW
CreateSemaphoreW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateFileMappingW
AreFileApisANSI
ExitProcess
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
SetConsoleCtrlHandler
IsProcessorFeaturePresent
VirtualQuery
VirtualProtect
GetTickCount
GetLocalTime
DuplicateHandle
InitializeCriticalSectionEx
DecodePointer
SystemTimeToFileTime
SetFileTime
SetFilePointer
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetCurrentThread
GetCurrentProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryW
FreeLibrary
GetWindowsDirectoryW
OpenProcess
WaitForSingleObject
LocalFree
GetProcAddress
GetModuleHandleW
GetVersionExW
DeviceIoControl
SetLastError
SetFileAttributesW
GetLongPathNameW
GetFullPathNameW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
WriteFile
ReadFile
GetFileSize
CreateFileW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
RemoveDirectoryW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
EnumSystemLocalesW
GetDriveTypeW
GetFullPathNameA
SetEnvironmentVariableA
GetFileInformationByHandle
GetFileSizeEx
LoadLibraryExA
VirtualAlloc
RtlUnwind
EncodePointer
OutputDebugStringW
GetClassNameW
MsgWaitForMultipleObjectsEx
EnumWindows
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
DefWindowProcW
DestroyWindow
CharNextW
UnregisterClassW
GetDesktopWindow
GetDC
ExitWindowsEx
SetTimer
PostQuitMessage
KillTimer
WaitMessage
GetQueueStatus
TranslateMessage
RegisterClassExW
CallMsgFilterW
PeekMessageW
CreateWindowExW
DispatchMessageW
CharUpperW
GetKeyState
IsWindowEnabled
FindWindowW
SystemParametersInfoW
IsWindow
GetSystemMetrics
PostMessageW
DeleteObject
GetDeviceCaps
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
SystemFunction036
RegNotifyChangeKeyValue
RegEnumValueW
ConvertSidToStringSidW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyExW
RegCreateKeyExW
RegOpenCurrentUser
RegCloseKey
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
MapGenericMask
IsValidSecurityDescriptor
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
GetFileSecurityW
FreeSid
EqualSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
LookupPrivilegeValueW
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
SetThreadToken
ConvertStringSidToSidW
LookupAccountSidW
SetTokenInformation
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
IsValidSid
InitializeSid
InitializeAcl
GetSidSubAuthority
GetSidLengthRequired
GetLengthSid
GetAclInformation
GetAce
CopySid
AddAce
RegisterTraceGuidsW
ShellExecuteW
SHFileOperationW
SHGetFolderPathW
ShellExecuteExW
SHGetFolderPathA
SHGetKnownFolderPath
CommandLineToArgvW
SHGetSpecialFolderPathW
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
PropVariantClear
SysAllocString
SysFreeString
VarUI4FromStr
VariantClear
SysStringLen
SHSetValueW
ord176
StrToIntW
SHStrDupW
StrChrW
SHGetValueW
StrCmpNW
StrCmpNIW
StrRChrW
StrCmpIW
StrCpyNW
PathRemoveFileSpecW
PathIsDirectoryW
PathGetDriveNumberW
PathFindExtensionW
PathAddBackslashW
PathFileExistsW
PathAppendW
InitCommonControlsEx
LoadUserProfileW
UnloadUserProfile
CreateEnvironmentBlock
DestroyEnvironmentBlock
WNetGetResourceInformationW
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
GetMappedFileNameW
QueryWorkingSet
EnumProcesses
NetApiBufferFree
NetGetJoinInformation
timeGetTime
timeBeginPeriod
timeEndPeriod
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ